On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic

被引:0
|
作者
Hashizume, Naoki [1 ]
Momose, Fumiyuki [2 ]
Chao, Jinhui [3 ]
机构
[1] Chuo Univ, Course Informat & Syst Engn, Grad Sch Sci & Engn, Bunkyo Ku, 1-13-27 Kasuga, Tokyo 1128551, Japan
[2] Chuo Univ, Fac Sci & Engn, Dept Math, Bunkyo Ku, 1-13-27 Kasuga, Tokyo 1128551, Japan
[3] Chuo Univ, Fac Sci & Engn, Dept Informat & Syst Engn, Bunkyo Ku, 1-13-27 Kasuga, Tokyo 1128551, Japan
关键词
Elliptic curve cryptosystems; Discrete logarithm problem; GHS attack; WEIL DESCENT; HYPERELLIPTIC CURVES; ALGORITHM;
D O I
10.1090/conm/701/14144
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, we present algorithms implementing the GHS attack against Elliptic curve cryptosystems (ECC). In particular, we consider two large classes of elliptic curves over cubic extension fields of odd characteristic which have weak covering curves against GHS attack, whose existence have been shown recently [17], [18], [19], [20]. We give algorithms to compute the defining equation of the covering curve and to transfer the DLP from the elliptic curve to the Jacobian of the covering curve. An algorithm to test if the covering curve is hyperelliptic is also given in the appendix.
引用
收藏
页码:125 / 150
页数:26
相关论文
共 37 条
  • [21] Weil descent attack of elliptic curves over finite fields of characteristic three
    Arita, S
    NEC RESEARCH & DEVELOPMENT, 2002, 43 (03): : 188 - 190
  • [22] Optimized quantum implementation of elliptic curve arithmetic over binary fields
    Kaye, PR
    QUANTUM INFORMATION & COMPUTATION, 2005, 5 (06) : 474 - 491
  • [23] Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields
    Yang, Guoqiang
    Kong, Fanyu
    Xu, Qiuliang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 243 - 249
  • [25] Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic
    Hakuta, Keisuke
    Sato, Hisayoshi
    Takagi, Tsuyoshi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 304 - +
  • [26] Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic
    Hakuta, Keisuke
    Sato, Hisayoshi
    Takagi, Tsuyoshi
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (03) : 199 - 238
  • [27] Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields
    Joux, Antoine
    Vitse, Vanessa
    JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 119 - 143
  • [28] High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
    Liu, Shuai
    Ju, Lei
    Cai, Xiaojun
    Jia, Zhiping
    Zhang, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 148 - 155
  • [29] New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic
    Negre, Christophe
    Robert, Jean-Marc
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (10) : 2875 - 2890
  • [30] Implementation of elliptic curve cryptosystems over GF(2n) in optimal normal basis on a reconfigurable computer
    Bajracharya, S
    Shu, C
    Gaj, K
    El-Ghazawi, T
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1001 - 1005